Eve M. SchoolerUniversity of Oxford | OX · Department of Engineering Science
Eve M. Schooler
PhD
About
65
Publications
35,473
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,002
Citations
Publications
Publications (65)
Data transmission tends to be neglected when considering the carbon efficiency of systems, even though the electricity usage of data networks as a whole is as large, or larger, than that of data centers. Accounting for carbon cost of the movement of data is hard, and is often assumed to be the responsibility of the receiver or an intermediate provi...
Keynote Abstract: At present, the Information/Communication Technology (ICT) industry’s consumption of electricity is estimated to be 2-3% of all electricity generated, with some predicting significant increases within the decade. Although data centers are well known as sizeable consumers, the impact of the networking infrastructure is actually as...
While extensive research has gone into demand response techniques in data centers, the energy consumed in edge computing systems and in network data transmission remains a significant part of the computing industry’s carbon footprint. The industry also has not fully leveraged the parallel trend of decentralized renewable energy generation, which cr...
Recent advances in virtualization technologies (e.g., uniker-nels, containers, and virtual machines), the move to data driven approaches and softwarized networking technologies (e.g., SDN, NFV, and data plane programming) have invigorated a new focus on combining computation and communication in distributed systems. At the same time, the proliferat...
Techniques are provided for optimizing the operations of an ICN, particularly for an ICN with clustered nodes. A cluster head node may function as an orchestrator and a coordinator for efficient caching, routing, and computing and for co-existence of ICN and IP nodes in the network. A content store of an ICN router may include an indication of the...
Systems and techniques for information centric network (ICN) high definition (HD) map distribution are described herein. For example, a vehicle may detect a map tile event (e.g., moving into an area for which the vehicle does not have an up-to-date map tile). The vehicle may transmit an interest packet a name for the map tile via an ICN and receivi...
System and techniques for distributed computing resources in an information centric network (ICN) are described herein. A request may be received at a node in the ICN. The request may include identification of a computing resource set and a timing threshold. Resources that correspond to a member of the computing resource set may be locked. The node...
In the Harry Potter novels, the magical map known as the Marauder's Map tracks the whereabouts of people in and around Hogwarts Castle, displaying their names, locations, and paths of marauding. What if such a map were realizable in the real world, customized to provide a window into any space within which you might wander? What if it was augmented...
Generally discussed herein are systems, devices, and methods for managing content of an information centric network (ICN). A component of an ICN can include a memory including an extended content store that includes content from at least one other component of the ICN, and first attributes of the content, the first attributes including a content po...
Generally discussed herein are systems, devices, and methods for data management in a reverse content data network (rCDN). A component of the rCDN may include a memory to hold content received from a first sensor device of a plurality of sensor devices of the rCDN and first attributes that describe properties of the content. The component may inclu...
IoT interoperability is critical to the realization of the IoT on a global scale. This paper examines how seemingly obvious choices for perfect IoT interoperability are not so perfectly rational and offers the concept of “Rational Interoperability” as a means to frame and to scope the discussion. We identify why a new framing conceptualization adds...
In this paper, we present an occupant localization approach through sensing footstep-induced floor vibrations. Occupant location information is an important part of many smart building applications, such as energy and space management in a personal home or patient tracking in a hospital room. Adoption of current occupant location sensing approaches...
The Internet of Things (IoT) is producing a tidal wave of data, much of it originating at the network edge, from applications with requirements unmet by the traditional back-end Cloud architecture. To address the disruption caused by the overabundance of data, this paper offers a holistic data-centric architectural vision for the data-centric IoT....
With the ever increasing number of connected devices and the over abundance of data generated by these devices, data privacy has become a critical concern in the Internet of Things (IoT). One promising privacy-preservation approach is Attribute-Based Encryption (ABE), a public key encryption scheme that enables fine-grained access control, scalable...
A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared t...
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater dat...
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater dat...
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater dat...
Motivated by the “clean-slate” opportunity of the evolving Smart Grid, we propose an Information Centric Networking (ICN) approach for the home communications fabric and create an ICN-based secure publish-subscribe system to support home energy management. We design a secure group communication protocol with efficient key management specifically em...
The authors suggest that smart energy management will be an important application area for pervasive computing, as the pressing societal need for a solution is clear and there is a close fit with technologies and approaches being developed under the pervasive rubric. They present five full papers, including a comprehensive survey spanning four deca...
Network defence is an elusive art. The arsenal to defend our devices and networks from attack is constantly lagging behind the latest methods used by attackers to break into them. To counteract this trend, we developed a distributed approach comprised of collaborative endhost detectors. Simulations reveal dramatic improvements over stand-alone dete...
We describe a method to detect botnet command and control traffic and individual end-hosts. We introduce the notion of “destination
traffic atoms” which aggregate the destinations and services that are communicated with. We then compute the ”persistence”,
which is a measure of temporal regularity and that we propose in this paper, for individual de...
To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly increase the ability to defend against attack, this comes at the cost of complexity due to the coordination of distributed hosts across the dynamic network. Many previous so...
Traditionally, user traffic profiling is performed by analyzing traffic traces collected on behalf of the user at aggregation points located in the middle of the network. However, the modern enterprise network has a highly mobile population that frequently moves in and out of its physical perimeter. Thus an in-the-network monitor is unlikely to cap...
We present a method for detecting large-scale worm attacks using only end-host detectors. These detectors propagate and aggregate alerts to cooperating partners to detect large-scale distributed attacks in progress. The properties of the host-based detectors may in fact be relatively poor in isola-tion but when taken collectively result in a high-q...
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homoge- neous makeup of the internet. Recent advances in anomaly- based intrusion detection systems (IDSs) have made use of the quickly spreading nature of these attacks to identify them with high sensitivity and at low false positive (FP...
The Real-time Transport Control Protocol (RTCP) is a crucial mechanism used, amongst other things, for synchronisation and feedback control in multimedia sessions. However as groups grow to large numbers, it faces two serious challenges: the growing deployment of unidirectional and asymmetric broadcast architectures, such as Source-Specific Multica...
In the Internet, large multimedia sessions typically rely on the Real-time Transport Protocol (RTP) for data transmission and on its accompanying Real-time Transport Control Protocol (RTCP) for feedback and control information. As groups grow to large numbers, RTCP faces two serious challenges. First, unidirectional and asymmetric broadcast archite...
Reliable data multicast is problematic. ACK/NACK schemes do not
scale to large audiences, and simple data replication wastes network
bandwidth. Fcast, “file multicasting”, combines multicast
with forward error correction to address both these problems. Like
classic multicast, Fcast scales to large audiences, and like other FEC
schemes, it uses band...
With the exponential growth of the Internet, there is a critical need to design efficient, scalable and robust protocols to support the network infrastructure. A new class of protocols has emerged to address these challenges, and these protocols rely on a few key techniques, or micro-algorithms, to achieve scalability. By scalability, we mean the a...
"Push" technologies to large receiver sets often do not scale due to large amounts of data replication and limited network bandwidth. Even with improvements from multicast communication, scaling challenges persist. Diverse receiver capabilities still result in a high degree of resends. To combat this drawback, we combine multicast with Forward Erro...
this document should not be interpreted as representing the official policies, either expressed or implied, of the AAUW, AFOSR, ARPA, NSF, or the U.S. government.
. As integrated services have become available to the desktop, users have embraced new modes of interaction, such as multimedia conferencing and collaborative computing. In this paper, we provide a survey of past and present research that has influenced this application area, and describe research directions for the future. Key words: Multimedia co...
This paper identifies some of the issues that need to be explored
in systems that support content-based delivery. Distributed systems
today are based on address-based delivery of messages. Each message
carries the unique addresses of the intended recipients. The idea in
content-based delivery is that information is delivered to those objects
that h...
Reliable data multicast is difficult to scale. Fcast, "file multicasting", combines multicast with Forward Error Correction (FEC) to solve this problem. Like classic multicast, Fcast scales to large audiences, and like other FEC schemes, it uses bandwidth very efficiently. Some of the benefits of this combination were known previously, but Fcast co...
We specify an abstract model for dynamic distributed control systems in which the component objectsmake local decisions based on system-wide constraints and approximate global state. We focus on the issueof distributed resource management, exploring a solution that is both compositional and scalable because itbuilds global events into the Java infr...
We have developed a scalable reliable multicast architecture for delivering oneto -many telepresentations. Whereas the transport for interactive real-time audio and video is concerned with timely delivery, other media, such as slides, images and animations require reliability. We propose to support reliability by combining multicast with forward er...
We have developed a scalable reliable multicast architecture for
delivering one-to-many telepresentations. In contrast to audio and
video, which are often transmitted unreliably other media, such as
slides, images and animations require reliability. Our approach
transmits the data in two layers. One layer is for session-persistent
data, with reliab...
Many styles of multimedia conferencing are likely to co-exist on the Internet, and many of them share the need to invite users to participate. The Session Initiation Protocol (SIP) is a simple protocol designed to enable the invitation of users to participate in such multimedia sessions. It is not tied to any specific conference control scheme, pro...
this paper is to present an overview of emerging work in the area of quality of service, and to try to understand the applicability of this work to the demands of users residing at end systems. The intent is for this document to provide pointers to important reference materials for those seeking to explore a particular area further. In addition, we...
this paper is to present an overview of emerging work in the area of quality of service, and to try to understand the applicability of this work to the demands of users residing at end systems. The intent is for this document to provide pointers to important reference materials for those seeking to explore a particular area further. In addition, we...
As integrated services have become available to the desktop, users have embraced new modes of interaction, such as multimedia
conferencing and collaborative computing. In this paper, we provide a survey of past and present research that has influenced
this application area, and describe research directions for the future.
Proposes a framework for the systematic design of directory-based distributed applications. We evaluate a space of directory designs using our framework. We present a case study consisting of design, implementation and analysis of directories for a multicast application. Our framework is based on a model that extends the formal concept of process k...
This document confines discussion to higher level issues: an overall connection architecture, the connection control protocol (CCP), and configuration management. It describes the model within which the CCP was framed and the motivation for this approach. A snapshot of work in progress, this document provides information for the Internet community,...
During the past two years, there has been dramatic growth in the development and use of real-time audio and video teleconferencing over the Internet. This growth began with the transmission of live audio and video from meetings of the Internet Engineering Task Force (IETF) to a remote audience that has expanded from 20 to over 600, and led to the e...
In recent years there has been dramatic progress on the enabling technologies for workstation-based multimedia teleconferencing applications. We expect that such applications will soon become an important component of many future social and business interactions. Teleconferencing applications have aspects of their state, such as membership, types o...
Have you ever imagined that you could participate in a musical performance with your friends across the Internet? Although streaming-media and collaborative computing
have made tremendous advances over the last decade, there still exist obstacles to accomplish this feat. I present an early project that demonstrated distributed music over the Inter...
MMCC, the multimedia conference control program, is a window-based tool for connection management. It serves as an application interface to a wide-area network packet teleconferencing system, in which it is used not only to orchestrate multisite conferences, but also to provide local and remote audio and video control, and to interact with other co...
This document specifies the functions supported by the Connection Control Protocol, the requirements of the applications that implement it, and its interfaces both to the programs that use it and to underlying services. The model within which it was framed and the motivation for this work are discussed in a companion document, "The Connection Contr...
As the last two meetings of the Internet Engineering Task Force (IETF) have shown, Internet teleconferencing has arrived. Packet audio and video have now been multicast to approximately 170 different hosts in 10 countries, and for the November 1992 meeting the number of remote participants is likely to be substantially larger. Yet the network infra...
What ingredients are needed to enable widespread personal teleconferencing over the Internet and NREN? Certainly the integration of audio and video compression hardware into workstations is essential. However, network protocols are as critical to this goal. This is the major focus of our work in the Multimedia Conferencing Project at ISI. Toward th...
Multimedia conferencing continues to be an active research area
with a diversity of systems being developed for a variety of situations.
In particular, multimedia conferencing is central to the idea of the
collaboratory, an electronic environment for conducting science. As a
vehicle for telecollaboration, multimedia conferencing promises to
provide...
The design, implementation, and use of a distributed processing
environment on a network of IBM PCs running DOS is described.
Temporarily unused PCs can be accessed by other users on the network to
perform distributed computations. An owner of a PC need not be aware
that the machine is being used during idle times; the machine is
immediately return...
A model for electronic documents is proposed. This model has two components: a directed acyclic graph structure and a set of constraints. These two components are used to describe the relationships among the data of documents. This model is more general ...
We consider the problem of identifying a network attack that provides evidence of its existence through the presence of weak, distributed information. One example of weak distributed information, discussed by Jung et al. [2004] and Weaver et al. [2004], occurs during a scanning worm's reconnaissance phase, where several hosts in a network may be ab...